tudorthe1ntruder / reverse-shell-pocLinks
Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61
☆39Updated 8 years ago
Alternatives and similar repositories for reverse-shell-poc
Users that are interested in reverse-shell-poc are comparing it to the libraries listed below
Sorting:
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- A tool to create obfuscated HTA script.☆179Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 4 years ago
- Code Exec via Excel☆88Updated 8 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Loads a custom dll in system32 via diaghub.☆81Updated 5 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆66Updated 5 years ago
- Malicious Shortcut(.lnk) Generator☆86Updated 7 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- ☆46Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆132Updated 2 years ago
- ReVBShell - Reverse VBS Shell☆82Updated last month
- named pipe server with impersonation☆60Updated 6 years ago
- DLL Generator for side loading attack☆175Updated 6 years ago
- Sustainable shellcode evasion☆112Updated 11 months ago
- Red Team Operator: Malware Development Essentials Course☆100Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 2 years ago
- My doodles as I learn C#☆75Updated 5 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- Shellcoding utilities☆223Updated 4 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆204Updated 8 years ago
- Dump stuff without touching disk☆164Updated 5 years ago
- ☆42Updated 7 years ago
- Dll that can be used for side loading and other attack vector.☆203Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Updated 5 years ago
- ☆167Updated 2 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142Updated 5 years ago
- ☆46Updated 8 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 6 years ago